Fingerprint Distortion Detection

Authors

  • Harshada Kanade  Department of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Pimpri, Pune, Maharashtra, India
  • Gauri Uttarwar  Department of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Pimpri, Pune, Maharashtra, India
  • Shweta Borse  Department of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Pimpri, Pune, Maharashtra, India
  • Archana. K  Department of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Pimpri, Pune, Maharashtra, India

DOI:

https://doi.org//10.32628/CSEIT2063204

Keywords:

Fingerprint, Biometric, Security, Distortion detection, Spoof

Abstract

Fingerprint is widely used in biometrics, for identification of individual’s identity. Biometric recognition is a leading technology for identification and security systems. It has unique identification among all other biometric modalities. Most anomaly detection systems rely upon machine learning. Calculations are performed to identify suspicious occasion. The primary purpose of this system is to ensure a reliable and accurate user authentication; this study addresses the problem of developing accurate, generalizable, and efficient algorithms for detecting fingerprint spoof attacks. The approach is to utilize local patches centered and aligned using fingerprint details. That proposed approach is to provide accuracies in fingerprint spoof detection for intra-sensor, cross material, crosssensor, as well as cross-dataset testing scenarios. The principle used is similar to the working of some cryptographic primitives, in particular to present the key into the plan so that a couple of operations are infeasible without knowing it.

References

  1. Fingerprint Spoof Buster: Use of Minutiae-centered Patches TarangChugh*, Student Member, IEEE, Kai Cao, and Anil K. Jain, Life Fellow, IEEE.
  2. D. Baldisserra, A. Franco, D. Maio, and D. Maltoni, “Fake fingerprint detection by odor analysis,” in Proc. ICB. Springer, 2006, pp. 265–272.
  3. Analysis of Fingerprint Pores for Vitality Detection Gian Luca Marcialis, Fabio Roli, and Alessandra Tidu Department of Electrical and Electronic Engineering – University of Cagliari Piazza d’Armi – I-09123 Cagliari (Italy).
  4. Survey on Fingerprint Spoofing, Detection Techniques and Database, Samruddhi S Kulkarni.
  5. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification with deep convolutional neural network”, in proc.Adv.NIPS,2012,pp.1097-1105.
  6. Nogueira, R. F., de AlencarLotufo, R., & Campos Machado, R. (2016). Fingerprint Liveness Detection Using Convolutional Neural Networks. IEEE Transactions on Information Forensics and Security, 11(6), 1206–1213.doi:10.1109/tifs.2016.2520880.
  7. Fingerprint Liveness Detection from Different Fingerprint Materials Using Convolutional Neural Network and Principal Component Analysis.
  8. Memon, S., Manivannan, N., & Balachandran, W. (2011). Active pore detection for liveness in fingerprint identification system. 2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers. doi:10.1109/telfor.2011.6143624.
  9. K. Cao and A. K. Jain, “Hacking mobile phones using 2D Printed Fingerprints,” MSU Tech. report, MSU- CSE-16-2, 2016.
  10. S. S. Arora, K. Cao, A. K. Jain, and N. G. Paulter, “Design and Fabrication of 3D Fingerprint Targets,” IEEE TIFS, vol. 11, no. 10,pp. 2284–2297, 2016.
  11. F. Chollet, “Xception: Deep learning with depthwise separable convolutions,” arXiv preprint arXiv:1610.02357, 2016.
  12. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
  13. D. Gragnaniello, G. Poggi, C. Sansone, and L. Verdoliva, “An investigation of local descriptors for biometric spoofing detection,” IEEE TIFS, vol. 10, no. 4, pp. 849–863, 2015.
  14. Zhao, Q., Zhang, L., Zhang, D., Luo, N., & Bao, J. (2008). Adaptive pore model for fingerprint pore extraction. 2008 19th International Conference on Pattern Recognition. doi:10.1109/icpr.2008.4761458.

Downloads

Published

2020-06-30

Issue

Section

Research Articles

How to Cite

[1]
Harshada Kanade, Gauri Uttarwar, Shweta Borse, Archana. K, " Fingerprint Distortion Detection, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 3, pp.559-562, May-June-2020. Available at doi : https://doi.org/10.32628/CSEIT2063204